{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:23:18Z","timestamp":1762298598276,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_8","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"110-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Android App Permission and Users\u2019 Adoption: A Case Study of Mental Health Application"],"prefix":"10.1007","author":[{"given":"Hsiao-Ying","family":"Huang","sequence":"first","affiliation":[]},{"given":"Masooda","family":"Bashir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Matthews, M., Doherty, G., Coyle, D., Sharry, J.: Designing mobile applications to support mental health interventions. In: Handbook of Research on User Interface Design and Evaluation for Mobile Technology, pp. 635\u2013656. IGI Global (2008)","DOI":"10.4018\/978-1-59904-871-0.ch038"},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10916-014-0181-3","volume":"39","author":"B Mart\u00ednez-P\u00e9rez","year":"2015","unstructured":"Mart\u00ednez-P\u00e9rez, B., De La Torre-D\u00edez, I., L\u00f3pez-Coronado, M.: Privacy and security in mobile health apps: a review and recommendations. J. Med. Syst. 39(1), 181 (2015)","journal-title":"J. Med. Syst."},{"issue":"6","key":"8_CR3","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1089\/tmj.2008.0152","volume":"15","author":"SM George","year":"2009","unstructured":"George, S.M., Hamilton, A., Baker, R.: Pre-experience perceptions about telemedicine among African Americans and Latinos in South Central Los Angeles. Telemed. e-Health 15(6), 525\u2013530 (2009)","journal-title":"Telemed. e-Health"},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"e76","DOI":"10.2196\/jmir.2500","volume":"15","author":"M Price","year":"2013","unstructured":"Price, M., Williamson, D., McCandless, R., Mueller, M., Gregoski, M., Brunner-Jackson, B., Treiber, F.: Hispanic migrant farm workers\u2019 attitudes toward mobile phone-based telehealth for management of chronic health conditions. J. Med. Internet Res. 15(4), e76 (2013)","journal-title":"J. Med. Internet Res."},{"key":"8_CR5","unstructured":"Racherla, P., Babb, J.S., Keith, M.J.: Pay-what-you-want pricing for mobile applications: the effect of privacy assurances and social information. In: Conference for Information Systems Applied Research Proceedings, vol. 4, no. 1833, pp. 1\u201313 (2011)"},{"key":"8_CR6","unstructured":"Krasnova, H., Eling, N., Abramova, O., Buxmann, P.: Dangers of \u2018Facebook Login\u2019 for Mobile Apps: Is There a Price Tag for Social Information? (2014)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Cranor, L.F., Sadeh, N.: Privacy as part of the app decision-making process. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3393\u20133402. ACM, April 2013","DOI":"10.1145\/2470654.2466466"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q. 167\u2013196 (1996)","DOI":"10.2307\/249477"},{"key":"8_CR9","unstructured":"Felt, A.P., Egelman, S., Finifter, M., Akhawe, D., Wagner, D.: How to ask for permission. In USENIX Workshop on Hot Topics in Security (HotSec) (2012)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: 2nd Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) (2012)","DOI":"10.1145\/2381934.2381943"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Symposium on Usable Privacy and Security (SOUPS) (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"8_CR12","unstructured":"NIMH: Any Anxiety Disorder Among Adults (2016). https:\/\/www.nimh.nih.gov\/health\/statistics\/prevalence\/any-anxiety-disorder-among-adults.shtml. Archived at: http:\/\/www.webcitation.org\/6lHXIjlha. Accessed 6 Feb 2017"},{"key":"8_CR13","unstructured":"Statista: Number of apps available in leading app stores as of June 2016 (2016). https:\/\/www.statista.com\/statistics\/276623\/number-of-apps-available-in-leading-app-stores\/. Archived at: http:\/\/www.webcitation.org\/6lHWw0RUk. Accessed 6 Feb 2017"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, B., Xu, H: Privacy nudges for mobile applications: effects on the creepiness emotion and privacy attitudes. In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, pp. 1676\u20131690. ACM, February 2016","DOI":"10.1145\/2818048.2820073"},{"issue":"10","key":"8_CR15","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1016\/j.telpol.2012.09.007","volume":"37","author":"S Nikou","year":"2013","unstructured":"Nikou, S., Mezei, J.: Evaluation of mobile services and substantial adoption factors with Analytic Hierarchy Process (AHP). Telecommun. Policy 37(10), 915\u2013929 (2013)","journal-title":"Telecommun. Policy"},{"issue":"8","key":"8_CR16","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1002\/mar.20238","volume":"25","author":"GS Kim","year":"2008","unstructured":"Kim, G.S., Park, S.B., Oh, J.: An examination of factors influencing consumer adoption of short message service (SMS). Psychol. Mark. 25(8), 769\u2013786 (2008)","journal-title":"Psychol. Mark."},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10257-012-0197-5","volume":"11","author":"T Wang","year":"2013","unstructured":"Wang, T., Oh, L.B., Wang, K., Yuan, Y.: User adoption and purchasing intention after free trial: an empirical study of mobile newspapers. Inf. Syst. e-Bus. Manag. 11(2), 189\u2013210 (2013)","journal-title":"Inf. Syst. e-Bus. Manag."},{"issue":"6","key":"8_CR18","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1037\/a0024485","volume":"42","author":"DD Luxton","year":"2011","unstructured":"Luxton, D.D., McCann, R.A., Bush, N.E., Mishkind, M.C., Reger, G.M.: mHealth for mental health: integrating smartphone technology in behavioral healthcare. Prof. Psychol.: Res. Pract. 42(6), 505 (2011)","journal-title":"Prof. Psychol.: Res. Pract."},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"135","DOI":"10.2753\/MIS0742-1222260305","volume":"26","author":"H Xu","year":"2009","unstructured":"Xu, H., Teo, H.H., Tan, B.C., Agarwal, R.: The role of push-pull technology in privacy calculus: the case of location-based services. J. Manag. Inf. Syst. 26(3), 135\u2013174 (2009)","journal-title":"J. Manag. Inf. Syst."},{"key":"8_CR20","unstructured":"Xu, H., Teo, H.H., Tan, B.: Predicting the adoption of location-based services: the role of trust and perceived privacy risk. In: ICIS 2005 Proceedings, p. 71 (2005)"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"e8","DOI":"10.2196\/mhealth.3672","volume":"3","author":"T Dehling","year":"2015","unstructured":"Dehling, T., Gao, F., Schneider, S., Sunyaev, A.: Exploring the far side of mobile health: information security and privacy of mobile health apps on iOS and Android. JMIR mHealth uHealth 3(1), e8 (2015)","journal-title":"JMIR mHealth uHealth"},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1177\/2050157914557509","volume":"3","author":"L Dogruel","year":"2015","unstructured":"Dogruel, L., Joeckel, S., Bowman, N.D.: Choosing the right app: an exploratory perspective on heuristic decision processes for smartphone app selection. Mob. Media Commun. 3(1), 125\u2013144 (2015)","journal-title":"Mob. Media Commun."},{"issue":"3","key":"8_CR23","doi-asserted-by":"publisher","first-page":"e81","DOI":"10.2196\/mhealth.4405","volume":"3","author":"DE Ramo","year":"2015","unstructured":"Ramo, D.E., Popova, L., Grana, R., Zhao, S., Chavez, K.: Cannabis mobile apps: a content analysis. JMIR mHealth uHealth 3(3), e81 (2015)","journal-title":"JMIR mHealth uHealth"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"American Psychiatric Association: Diagnostic and statistical manual of mental disorders (DSM-5\u00ae). American Psychiatric Pub. (2013)","DOI":"10.1176\/appi.books.9780890425596"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Granka, L.A., Joachims, T., Gay, G.: Eye-tracking analysis of user behavior in WWW search. In: Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 478\u2013479. ACM, July 2004","DOI":"10.1145\/1008992.1009079"},{"key":"8_CR26","unstructured":"Sadeh, J.L.B.L.N., Hong, J.I.: Modeling users\u2019 mobile app privacy preferences: restoring usability in a sea of permission settings. In: Symposium on Usable Privacy and Security (SOUPS), vol. 40, July 2014"},{"key":"8_CR27","unstructured":"Statista: Cumulative number of apps downloaded from the Google Play as of May 2016 (in billions). https:\/\/www.statista.com\/statistics\/281106\/number-of-android-app-downloads-from-google-play\/. Accessed 6 Feb 2017"},{"key":"8_CR28","unstructured":"Google Play: Manifest.Permission. https:\/\/developer.android.com\/reference\/android\/Manifest.permission.html. Accessed 6 Feb 2017"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:53:19Z","timestamp":1625104399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}